443 lines
26 KiB
Plaintext
443 lines
26 KiB
Plaintext
|
|
|
|
XX XXXXXX XXXXX XXXXX XX
|
|
XX XX XX XX XX XX
|
|
XX XXXX XX XXX XXXXXXX XX
|
|
XX XX XX X XX XX XX
|
|
XXXXXX XXXXXX XXXXX XX XX XXXXXX
|
|
|
|
XXXXX XX XX XXXXXX XXXXXX XXXXXX
|
|
XX XX XX XX XX XX XX
|
|
XXXXX XXXX XX XXXX XXX
|
|
XX XX XX XX XX XX
|
|
XXXXX XX XX XXXXXX XXXXXX
|
|
__________________________________
|
|
|
|
Winter 1992-93, Volume 1, Number 1
|
|
__________________________________
|
|
|
|
By George, Donaldson & Ford
|
|
Attorneys at Law
|
|
A Registered Limited Liability Partnership
|
|
1000 Norwood Tower
|
|
114 West Seventh Street
|
|
Austin, Texas 78701
|
|
(512) 495-1400
|
|
(512) 499-0094 (FAX)
|
|
___________________________________
|
|
|
|
Copyright (c) 1993 George, Donaldson & Ford, L.L.P.
|
|
(Permission is granted freely to redistribute
|
|
this newsletter in its entirety electronically.)
|
|
___________________________________
|
|
|
|
David H. Donaldson, Jr., Editor <DHDONALD+aGD&F%GDF@mcimail.com>
|
|
|
|
Peter D. Kennedy, Associate Editor <PDKENNED+aGD&F%GDF@mcimail.com>
|
|
___________________________________
|
|
|
|
IN THIS ISSUE:
|
|
|
|
1. ARE ELECTRONIC BULLETIN BOARD SYSTEM OPERATORS LIABLE FOR THEIR
|
|
USER'S LIBELOUS STATEMENTS?
|
|
|
|
2. ELECTRONIC PUBLISHING, BULLETIN BOARD E-MAIL, AND THE STEVE JACKSON
|
|
GAMES CASE
|
|
|
|
3. WHEN IS A COMPUTER PROGRAM A "COPY"?
|
|
|
|
4. CAN YOU INFRINGE A COPYRIGHT WHILE ANALYZING A COMPUTER PROGRAM?
|
|
|
|
5. DOES ANTITRUST LAW HAVE A PLACE IN THE COMPUTER INDUSTRY?
|
|
|
|
6. WHAT DO YOU MEAN WE DON'T OWN THE SOFTWARE?
|
|
|
|
=========================================================================
|
|
|
|
1. ARE ELECTRONIC BULLETIN BOARD SYSTEM OPERATORS LIABLE FOR THEIR USER'S
|
|
LIBELOUS STATEMENTS?
|
|
|
|
Electronic bulletin boards are now very popular "places" for people
|
|
to "meet" and discuss issue of the day -- from politics to fantasy game-
|
|
playing to bird watching. The unique freedom bulletin boards offer is both
|
|
a great advantage and a potential source of new legal questions and
|
|
headaches. Many bulletin boards are free of charge, or charge only modest
|
|
fees, and the cost of a personal computer and modem has dropped
|
|
dramatically. Unlike other means of mass communication, electronic
|
|
bulletin boards present no significant barriers to entry; almost anyone can
|
|
become a fully active member in wide-ranging discussions and debates
|
|
involving hundreds or even thousands of participants and observers. Users
|
|
are free to post whatever messages suit their fancy, limited only by the
|
|
possibility of editing or deletion by the system operator.
|
|
|
|
The system operators of most bulletin boards commonly do not edit or
|
|
control the messages and files posted by users. For the large
|
|
communication services such as CompuServe and Prodigy, meaningful editorial
|
|
control or review of messages and uploads is impossible. The system
|
|
operators of smaller boards generally prefer to allow the discussions on
|
|
their boards to range freely, while simply defining the areas and topics
|
|
for discussion, and perhaps setting the tone or direction of discourse.
|
|
The technical work of maintaining a board is demanding enough, without the
|
|
added chore of reviewing the content of each posting and file. Many sysops
|
|
are rightly satisfied to provide a forum for discussion -- a democratic,
|
|
uninhibited common ground in cyberspace for the "robust and wide-open"
|
|
debate of public issues the First Amendment is meant to guarantee.
|
|
|
|
Where technology leads, law is sure to follow. A host of legal
|
|
questions have arisen around electronic bulletin boards, from the legal
|
|
protection for private electronic mail carried on boards, to the right of
|
|
BBSs to discount telephone rates. Many legal questions involve the sysop's
|
|
possible liability, both civil and criminal, from potential criminal
|
|
liability for knowingly providing a means for the distribution of
|
|
electronic "contraband" (such as purloined passwords, or stolen documents,
|
|
codes, and credit card numbers) to possible civil penalties for copyright
|
|
infringement.
|
|
|
|
A significant legal question is how the age-old civil lawsuit of
|
|
defamation of character should apply (if at all), to the brand-new medium
|
|
of the electronic bulletin board -- more specifically, when is the system
|
|
operator of a bulletin board liable for defamatory statements posted by a
|
|
user?
|
|
|
|
Despite a spate of articles about the legal protection,
|
|
constitutional and otherwise, enjoyed by sysops and BBS users, very few
|
|
actual court decisions have been issued defining the scope of protection
|
|
and potential liability. The most significant decision to reach the law
|
|
reports so far concerning sysop liability for defamation is CUBBY, INC. v.
|
|
COMPUSERVE, INC., (reported in 776 F. Supp. 135 (S.D.N.Y. 1991)).
|
|
|
|
CompuServe Inc., which runs one of the larger on-line information
|
|
systems, included in its Journalism Forum a daily newsletter called
|
|
"Rumorville USA." A company called DFA wrote and published the newsletter,
|
|
and provided it to a company known as CCI. CCI had contracted with
|
|
CompuServe to manage, review, and edit the contents of the Journalism
|
|
Forum, and uploaded "Rumorville USA" to the service, without prior approval
|
|
or review by CompuServe. CompuServe had no contract with DFA, the
|
|
newsletter's author, but only with CCI.
|
|
|
|
Cubby, Inc., a company that was developing a journalism news database
|
|
hoping to compete with "Rumorville USA," was unhappy with a story in a
|
|
"Rumorville USA" issue that mentioned Cubby. Cubby sued DFA and
|
|
CompuServe, alleging that the article libelled Cubby and its owner. Judge
|
|
Leisure of the federal district court located in New York City held that
|
|
even if the "Rumorville USA" article defamed Cubby (which was in dispute)
|
|
*CompuServe* could not be held responsible. The judge saw CompuServe as
|
|
an "electronic, for-profit library," that had no opportunity to review the
|
|
content of its holdings before they are published. "Secondary publishers"
|
|
such as libraries and bookstores are not responsible for the content of the
|
|
books they offer unless they know, or have reason to know, of the books'
|
|
objectionable nature. The judge noted that the sheer volume of the
|
|
material posted on CompuServe kept it from ever knowing or having reason
|
|
to know that a certain posting was defamatory. Because the technology and
|
|
volume made it unreasonable and unfeasible for CompuServe to monitor every
|
|
statement made on its service, Judge Leisure dismissed the suit against
|
|
CompuServe.
|
|
|
|
While sysops breathed a sigh of relief after CUBBY v. COMPUSERVE was
|
|
decided, the case will not be the last word. For one, while other courts
|
|
will pay it some mind, the case is controlling precedent for only one
|
|
federal trial court in New York City. New York's status as an important
|
|
center of both libel *and* computer law does increase the persuasive
|
|
authority of CUBBY v. COMPUSERVE, however.
|
|
|
|
Second, the specific facts of the case keep CUBBY v. COMPUSERVE from
|
|
being a sweeping precedent. Because CompuServe is so big, it is reasonable
|
|
not to expect it to review the contents of every posting, but what about
|
|
smaller boards? If the system operator of a board is also an active user,
|
|
and could theoretically review all the latest postings, is he or she
|
|
protected by the decision in CUBBY v. COMPUSERVE? What if CompuServe had
|
|
been given notice of the defamatory nature of the article, but refused to
|
|
remove it from the system? Judge Leisure's logic would indicate that if
|
|
there was proof that CompuServe *knew* that "Rumorville USA" had defamed
|
|
Cubby, it would not escape liability on that ground alone; it would have
|
|
to defend the defamation action on more traditional grounds -- that the
|
|
statement was a constitutionally protected statement of opinion on an issue
|
|
of public concern, or a privileged comment about a public figure, for
|
|
example, or that the statement, although harmful, was substantially true.
|
|
(And, there is currently little reason to think that law of libel will
|
|
apply any differently to the person *who* actually makes the defamatory
|
|
statement on an electronic bulletin board, than it does to a person making
|
|
such a statement. Judge Leisure has not published any opinion discussing
|
|
the outcome of Cubby's suit against the *authors* of "Rumorville USA.")
|
|
|
|
Paradoxically, Judge Leisure's decision in CUBBY v. COMPUSERVE may
|
|
encourage sysops *not* to review the contents of their boards, in order to
|
|
claim ignorance of defamatory postings. Outside the courtroom, writers
|
|
have been trying to develop legal theories that give system operators
|
|
satisfactory protection. These range from the "secondary publisher"
|
|
analogy adopted by CUBBY v. COMPUSERVE, (see L. Becker, Jr., "The Liability
|
|
of Computer Bulletin Board Operators for Defamation Posted by Others", 22
|
|
Conn. L. Rev. 203 (1989)), to suggesting that electronic bulletin boards
|
|
might be treated like "common carriers" such as telephone companies, making
|
|
them immune from any liability for statements passing through their wires
|
|
(see R. Charles, "Computer Bulletin Boards and Defamation: Who Should be
|
|
Liable? Under What Standard?", 2 J. Law & Tech. 121 (1987) and E. Jensen,
|
|
"An Electronic Soapbox: Computer Bulletin Boards and the First Amendment,"
|
|
39 Fed. Comm. Law J. 217 (1987)). An upcoming article even argues that the
|
|
unique nature of electronic bulletin boards should *protect* the sysops,
|
|
not present additional legal risks: because bulletin boards, unlike other
|
|
mass media, offer persons who think they have been defamed by a message on
|
|
the board a free, immediate, and practically unlimited right to reply to
|
|
the message, the law should recognize a privilege for the sysop from suit
|
|
for defamation carried on his or her board who allows access for replies.
|
|
This would encourage rather than stifle free discussion, the purpose of the
|
|
First Amendment (see E. Cavazos, Note, "Computer Bulletin Board Systems and
|
|
the Right of Reply: Redefining Defamation Liability for a New Technology,"
|
|
Volume 12, The Review of Litigation (forthcoming)).
|
|
|
|
If the experience of the more traditional mass media is any
|
|
indication, we can expect more defamation lawsuits brought against the
|
|
operators and owners of bulletin board systems, until the contours of the
|
|
law are better settled by concrete decisions or legislation.
|
|
_________________________________________________________________________
|
|
|
|
2. ELECTRONIC PUBLISHING, BULLETIN BOARD E-MAIL, AND THE STEVE JACKSON
|
|
GAMES CASE
|
|
|
|
Currently moving through federal court is a lawsuit that may help
|
|
define the legal protection for electronic publishers and electronic mail,
|
|
and set limits on government law enforcement officials searching for
|
|
evidence of illegal computer hacking.
|
|
|
|
On May 1, 1990, the United States Secret Service (charged with
|
|
investigating computer crime as well as protecting the President) searched
|
|
the offices of Steve Jackson Games, a fantasy role-playing game publisher
|
|
in Austin, Texas. The Secret Service confiscated and kept for months three
|
|
of the company's computers, including one computer that ran the company's
|
|
electronic bulletin board, and another that contained drafts of an upcoming
|
|
book. The Service claimed it was investigating suspected illegal activity
|
|
of a Steve Jackson Games employee.
|
|
|
|
In May, 1991, Steve Jackson, his company, and three active users of
|
|
the company's bulletin board sued the Secret Service and the responsible
|
|
officials to recover the damages caused by the raid, which included the
|
|
temporary loss of the bulletin board, as well as the loss of the book.
|
|
Prominent issues in the lawsuit include whether the Secret Service had
|
|
probable cause to search the offices in the first place, and whether the
|
|
government violated the Electronic Communications Privacy Act (which
|
|
prohibits the illegal interception, disclosure or use of electronic
|
|
communications) by seizing and reviewing the BBS computer.
|
|
|
|
In recent filings, the government asked the court to dismiss the
|
|
case, arguing, among other things, that the bulletin board's users had no
|
|
"reasonable expectation of privacy" in the contents of their e-mail, that
|
|
Steve Jackson's book-form, role-playing games and magazines are not worthy
|
|
of protection by the Privacy Protection Act, and that the Electronic
|
|
Communications Privacy Act does not prohibit the government from seizing
|
|
and reading the entire contents of a BBS, including the e-mail, so long as
|
|
there is a search warrant which authorizes the seizure of computers. Steve
|
|
Jackson and the three users of his board (represented by George, Donaldson
|
|
& Ford) have asked the judge to rule that even as the Secret Service tells
|
|
the story, the law was violated. The case was tried before Judge Sam
|
|
Sparks in an Austin, Texas federal court the week of January 26, 1993, and
|
|
awaits Judge Spark's ruling.
|
|
_________________________________________________________________________
|
|
|
|
3. WHEN IS A COMPUTER PROGRAM A "COPY"?
|
|
|
|
When the computer whizzes of today were growing up, one of the most
|
|
popular Saturday morning cartoon programs was "H.R. Pufnstuf." This
|
|
creation of Sid and Marty Krofft - a life-action adventure featuring human
|
|
caricatures and fanciful creatures - lead to one of the first modern cases
|
|
to grapple with an issue that now plagues the computer software industry:
|
|
What is the dividing line between an idea, concept, or process, which is
|
|
not protected by copyright law, and the expression of an idea, which is
|
|
protected? When McDonald's introduced its "McDonaldland" with
|
|
"Hamburglar," "Fry Guys," talking fries with human faces, and other
|
|
characters, Sid and Marty Krofft sued, alleging that although the
|
|
McDonaldland creatures were not exact imitations of the characters in "H.R.
|
|
Pufnstuf," they were substantially similar and therefore their use
|
|
constituted a copyright infringement. (SID & MARTY KROFFT TELEVISION v.
|
|
McDONALD'S CORP., 562 F.2d 1157 (9th Cir. 1977)). A jury, after reviewing
|
|
both creations, agreed with Sid and Marty, and the courts ultimately
|
|
affirmed the jury's verdict, holding that although "Hamburglar" and his
|
|
buddies were not exact duplicates, they "captured the 'total concept and
|
|
feel'" of "H.R. Pufnstuf," which justified a finding of substantial
|
|
similarity and, in turn, copyright infringement. McDonald's Corporation
|
|
was forced to seek a license from the Kroffts.
|
|
|
|
The same scenario, although now much more complex, is being played
|
|
out in the computer industry. Over the last seven years federal courts,
|
|
which consider cases involving the copyright infringement, have been
|
|
grappling with what constitutes copyright infringement in the software
|
|
industry.
|
|
|
|
These cases arise because as new types of programs are created or new
|
|
ways of doing or presenting the same type of function are adopted, persons
|
|
who believe that they can produce a product that offers the same
|
|
functionality with improvements want to get into the market as well. Not
|
|
surprisingly, because consumers are reluctant to re-learn programs, new
|
|
entrants into the market try to make their product familiar to those who
|
|
have become accustomed to the industry standard. New entrants may use some
|
|
of the key strokes, screen displays and other characteristics of the
|
|
industry standard, along with the innovations and advantages that the new
|
|
entrant offers. Normally the new entrant's software has different source
|
|
code and object code from the industry standard. So there is no *literal*
|
|
copying of the source code or object code of the competitor. However, when
|
|
a new entrant incorporates some of the screen displays, the methods in
|
|
which the program operates, or the key strokes of the competitor, some
|
|
courts have held that this *non-literal* copying can be copyright
|
|
infringement as well.
|
|
|
|
The court attempting to sort out the legal differences and
|
|
similarities between "H.R. Pufnstuf" and McDonaldland had it easy compared
|
|
with today's courts that are struggling with a way to express in legal
|
|
terms the standard that will apply in deciding whether a software program
|
|
is a "copy" of another program. Three schools of thought are currently
|
|
battling for supremacy in the courts throughout the country. The first two
|
|
approaches seem to be losing ground, to, naturally, the one most complex
|
|
and difficult to apply.
|
|
|
|
The first concept, prevalent primarily in the southwest in the United
|
|
States Court of Appeals for the Fifth Circuit (which includes Texas,
|
|
Louisiana, Mississippi) essentially says that absent literal copying of the
|
|
code or the screen displays, similarity in the structures of the program,
|
|
the sequence of key strokes, and other methods by which the program
|
|
operates are not copyright infringement. (PLAINS COTTON CO-OP v.
|
|
GOODPASTURE COMPUTER SERVICE, INC., 807 F.2d 1256 (5th Cir.), cert. denied,
|
|
484 U.S. 821 (1987)). This approach was announced early in the development
|
|
of this area of the law. While it affected the development of the law in
|
|
this area, it does not appear to have gathered very many adherents.
|
|
|
|
The second approach, used by the United States Court of Appeals for
|
|
the Third Circuit (Pennsylvania, Delaware, New Jersey, Virgin Islands)
|
|
provides expansive copyright protection to computer software.
|
|
|
|
In WHELAN ASSOCIATES, INC. v. JASLOW DENTAL LABORATORY, INC., 797
|
|
F.2d 1222 (3rd Cir. 1986), the Third Circuit analyzed whether a dental
|
|
program designed for the IBM Series I computer written in event-driven
|
|
language ("EDL") was infringed by the defendants' "Dentlab" program
|
|
designed for the IBM/PC computer and written in Basic. Obviously, the two
|
|
programs were not literally the same because they had different languages
|
|
in which they were written, so the question was whether the *non-literal*
|
|
elements of the program -- the structure of the program, the sequence of
|
|
key strokes used to operate the program and the organization of the program
|
|
-- were substantially similar.
|
|
|
|
The court's key conclusion was that copyright protection of computer
|
|
programs extends beyond the programs' literal code to their structure,
|
|
sequence, and organization. The court held that a computer program is a
|
|
literary work and, like a play or a book, it can be copied by copying its
|
|
plot or its plot devices even though the copy may not be written in exactly
|
|
the same words or use exactly the same names. In responding to the claim
|
|
that the copyright statute does not protect ideas, concepts or processes,
|
|
the court said that in a computer program the purpose to be accomplished
|
|
by the program is the "idea" and that everything else that is not necessary
|
|
to that purpose or function is part of the expression of the idea. Where
|
|
there are various means of achieving the desired purpose, then the
|
|
particular means chosen is not *necessary* to the purpose and therefore is
|
|
expression and not idea.
|
|
|
|
Accordingly, the court compared how the two computer programs
|
|
accomplished the purpose of the program. It found a virtual identity of
|
|
most of the file structures used in each program, the screen outputs of
|
|
both programs, and an almost identical performance of five particularly
|
|
important sub-routines in the programs. The court affirmed the district
|
|
court's finding that there was substantial similarity between the programs
|
|
and therefore a copyright infringement.
|
|
|
|
The WHELAN approach to determining what is protected and
|
|
copyrightable in evaluating substantial similarity has been under attack
|
|
by the United States Court of Appeals for the Second Circuit (New York),
|
|
which serves the important media center of New York. In COMPUTER
|
|
ASSOCIATES INTERNATIONAL, INC. v. ALTAI, INC., 61 U.S.L.W. 2434, 1992 WL
|
|
372273 (2d Cir. 1992) (opinion on rehearing), the court adopted a different
|
|
approach to analyzing substantial similarity: a three part test involving
|
|
abstraction, filtration and comparison.
|
|
|
|
The ALTAI court began by explaining how it understood a computer
|
|
program was created: first, the programmer must identify the program's
|
|
ultimate function or purpose; second, the programmer breaks down the
|
|
ultimate function into subtasks; third, the subroutines are organized into
|
|
flow charts outlining the interaction (the structure of the program);
|
|
fourth, to assure the subroutines' proper interaction, parameter lists are
|
|
prepared; and finally, once the modules have been identified, designed and
|
|
interrelationships laid out conceptually, the code must be written to
|
|
reflect the design. Source code is written in English language statements
|
|
and then compiled into object code. The court noted that the actual "text"
|
|
of a computer program -- the source and object code -- are firmly protected
|
|
by copyright law.
|
|
|
|
The court held that computer programs are "literary works" under the
|
|
Copyright Act, and therefore some non-literal aspects are protected as
|
|
well, but only so far as they incorporate the programmer's *expression* of
|
|
ideas as opposed to the *ideas* themselves. The Second Circuit said the
|
|
first step in deciding whether a program which does not literally copy
|
|
source or object code is "substantially similar" to a copyrighted program
|
|
is "abstraction." In essence, the court reverse engineers the copyrighted
|
|
computer program theoretically by dissecting the allegedly copied program's
|
|
structure and isolating each level of abstraction contained within it. The
|
|
process begins at the most basic level with the code and ends with the
|
|
articulation of the program's ultimate function -- for example, a
|
|
spreadsheet or a database. The court retraces and maps the designer's
|
|
steps but in the opposite direction taken by the designer. Once the
|
|
program's abstraction levels are determined, then a process of "filtration"
|
|
occurs.
|
|
|
|
In the filtration process the structural program is "filtered"
|
|
through a legal analysis to take out all of the aspects of the program that
|
|
are not protectable. The "filters" include (1) whether a structural
|
|
component was an idea or dictated by considerations of efficiency so as to
|
|
be necessarily incidental to that idea (the "idea" of columns on a
|
|
spreadsheet would include the code necessary to create the columns); (2)
|
|
whether the structural component is required by factors external to the
|
|
program itself (all spreadsheets need columns); or (3) was taken from the
|
|
public domain and hence, is nonprotectable expression (the use of columns
|
|
in accounting).
|
|
|
|
To elaborate, if there is only one efficient way to accomplish the
|
|
idea, then the procedure or method used to accomplish the idea merges into
|
|
the idea itself and is not protectable. Elements dictated by external
|
|
factors involve certain standard or stock devices that must be used to make
|
|
the program work. Examples of such extrinsic considerations include (1)
|
|
the computer's mechanical specifications; (2) compatibility requirements
|
|
of other programs; (3) the computer manufacturer's design standards; (4)
|
|
demands of the industry being serviced; and (5) widely accepted programming
|
|
practices within the computer industry. Elements taken from the public
|
|
domain would include material that is available generally such as
|
|
shareware, standard programming techniques, or code generators.
|
|
|
|
The final step is "comparison." Once the court filters the program
|
|
that was allegedly copied to take out all of the non-protected elements,
|
|
it compares the remaining nugget of protected expression with the allegedly
|
|
infringing program to see if there is any substantial similarity between
|
|
the two. After the ALTAI court completed this process, although there were
|
|
some similarities between the programs, they were so small or
|
|
insignificant, or so simple and obvious that their use could not be
|
|
considered copyright infringement.
|
|
|
|
The ALTAI court recognized that its opinion would make it
|
|
substantially more difficult for the owners of computer software to assert
|
|
copyright infringement actions against infringers. The court seemed to
|
|
confess that it had not clarified matters much: "to be frank, the exact
|
|
contours of copyright for non-literal program structure are not completely
|
|
clear" and anticipated that future cases would define the parameters more
|
|
clearly.
|
|
|
|
ALTAI's approach differed from WHELAN because in ALTAI the court
|
|
examined *each* level of abstraction in the program as opposed to the
|
|
overall program in its entirety. The WHELAN court's approach was
|
|
considered to be too overbroad because it found that the program had only
|
|
one "idea" and everything else was considered "expression." The ALTAI
|
|
court considered its more sophisticated abstraction, filtration and
|
|
comparison tests superior.
|
|
|
|
Subsequent courts appear to have sided with ALTAI and against WHELAN.
|
|
In ATARI GAMES CORP. v. NINTENDO OF AMERICA, INC., 975 F.2d 632 (Fed. Cir.
|
|
1992), the United States Court of Appeals for the Federal Circuit, the
|
|
court that considers patent and related lawsuits, adopted the ALTAI
|
|
approach to analyzing substantial similarity. Similarly, the United States
|
|
Court of Appeals for the Ninth Circuit, which includes California, has also
|
|
endorsed the dissection of copyrighted work to determine the level of
|
|
protection that will be afforded. BROWN BAG SOFTWARE v. SYMANTEC, 960 F.2d
|
|
1465 (9th Cir. 1992). Federal district judges, on the trial level, have
|
|
also adopted the ALTAI approach to determining substantial similarity.
|
|
|
|
As the Second Circuit admitted, however, the scope of copyright
|
|
protection for non-literal elements of a computer program remains
|
|
unsettled. If an exact copy is made of another program then copyright
|
|
infringement will occur. If a program is a completely independent creation
|
|
there is no copyright infringement because no copying has occurred.
|
|
Between those two extremes the law remains muddy and will depend largely
|
|
on the facts of each case and how the facts are presented to the court.
|